ExamGecko
Question list
Search
Search

List of questions

Search

Related questions











Question 245 - PT0-002 discussion

Report
Export

A penetration tester discovered that a client uses cloud mail as the company's email system. During the penetration test, the tester set up a fake cloud mail login page and sent all company employees an email that stated their inboxes were full and directed them to the fake login page to remedy the issue. Which of the following BEST describes this attack?

A.
Credential harvesting
Answers
A.
Credential harvesting
B.
Privilege escalation
Answers
B.
Privilege escalation
C.
Password spraying
Answers
C.
Password spraying
D.
Domain record abuse
Answers
D.
Domain record abuse
Suggested answer: A

Explanation:

Credential harvesting is a type of attack that aims to collect usernames and passwords from unsuspecting users by tricking them into entering their credentials on a fake or spoofed website.

Credential harvesting can be done by using phishing emails that lure users to click on malicious links or attachments that redirect them to the fake website. The fake website may look identical or similar to the legitimate one, but it will capture and store the user's credentials for later use by the attacker.

In this case, the penetration tester set up a fake cloud mail login page and sent phishing emails to all company employees to harvest their credentials.

asked 02/10/2024
Nickolas Abbas
51 questions
User
Your answer:
0 comments
Sorted by

Leave a comment first